In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
Original: https://www.enmotech.com/web/detail/1/776/1.html
Thanks to the support of Electronic Industry Press, I had the opportunity to revise and publish a book I published many years ago: Oracle DBA Notebook 4: data Security Alert Book.
This book is my favorite book, so it has been constantly on my mind and constantly updated over the years, which is why I have today's revised edition.
The title of the book contains the word "warning", which is intended to warn companies or readers through some painful cases to avoid problems and not to get caught up in the difficulties described in the book.
So the writing of this book is divided into two parts:
Industry cases, through cases, story summary rules as a warning, warn us to prevent and avoid problems and prevent problems before they occur.
Analysis of difficulties, through the process of solving and analyzing cases, go deep into the internal technology to teach each other, hoping to pass on the ideas and methods.
Those who are simple are extremely simple, and those who are complicated are extremely complicated.
However, since there is the author's selfishness and obsession in it, this book must not suit the taste of all readers. Please understand the content first and then decide whether to start or not.
The electronic version of the first edition of this book has long been available for download by open source. Friends can download it and understand that the revised version has about 40% of the same content. If you don't like the first edition, you should not like the second edition. Do not mistakenly enter: https://cs.enmotech.com/books
In addition, please do not be misled by the word "security" in the title of the book, this book is mainly about the related technology of Oracle database, and does not include security-related content such as penetration, missed scan, attack and so on. However, the various cases and rules in the book are in fact blood and tears, and countless painful lessons are summed up. Those who know them know themselves and the readers encourage them.
In addition, according to the usual practice, I will continue to open source the content of the book in the near future, and the author is lucky to have one or two chapters to please the readers. and that.
Thanks to my friends for their support along the way, so I can continue to work hard. Do not forget the original ideal and ambition, sharpen and move forward.
Want to know more about databases and cloud technologies?
Come and follow the official account of "data and Cloud" and the official website of "Yunhe Enmo". We look forward to learning and making progress with you!
(scan the QR code above and follow the official account of "data and Cloud" for more science and technology articles.)
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.